RESOURCES

Datasheets

ThreatSTOP Overview
Description: ThreatSTOP is a powerful service that blocks attacks before they reach your network, and prevents data theft. Unlike other tools that only integrate into a SIEM or notify you of threats, ThreatSTOP deflects attacks that have bypassed your firewall, IDS/IPS, web filter and endpoint security. Then ThreatSTOP’s real-time reporting provides the visibility you need to remediate threats.
Download Datasheet »
ThreatSTOP DNS Firewall for Microsoft Azure
Description: Securing your Azure environment is paramount. The ThreatSTOP Platform delivers scalable, easy-to-use protection for cloud workloads that blocks known and emerging threats immediately. ThreatSTOP DNS Firewall can be deployed quickly on new and existing Azure networks.
Download Datasheet »
ThreatSTOP IP Firewall for Microsoft Azure
Description: Securing your Azure environment is paramount. The ThreatSTOP Platform delivers scalable, easy-to-use protection for cloud workloads that blocks known and emerging threats immediately. ThreatSTOP IP Firewall can be deployed quickly on new and existing Azure networks.
Download Datasheet »
ThreatSTOP DNS Firewall for Microsoft Windows Server 2016
Description: To help ensure the security of your network ThreatSTOP turns Windows Server 2016 into a powerful DNS Firewall delivering highly scalable, easy-to-use protection that blocks known and emerging threats immediately, and best of all, it can be deployed quickly and easily without adding new software or hardware to your environment.
Download Datasheet »
ThreatSTOP DNS Firewall
Description: ThreatSTOP DNS Firewall is a highly effective, proactive security solution that blocks advanced threats from completing their mission, be it DDos attacks, data theft or corruption, or phishing. It delivers up-to-the-minute protection against advanced attacks, and enhances your existing security posture by adding a powerful layer of security that functions at the DNS level, and delivers granular control over the actions taken against outbound network queries.
Download Datasheet »
ThreatSTOP IP Firewall
Description: ThreatSTOP IP Firewall provides customizable real-time configuration management of your firewalls, routers, switches, cloud environments, and DNS servers in a heterogeneous network to maximize the power and functionality of your existing network infrastructure. Your security policy will be enforced at the network level with the ability to tailor your policy on a device-by-device basis.
Download Datasheet »
ThreatSTOP Technology Overview
Description: The ThreatSTOP® Shield service delivers up-to-the-minute threat intelligence to routers, firewalls and DNS servers to provide an automated, proactive defense against malicious attacks such as ransomware, DDoS, and botnets. A cloud-based service, it works with a customer’s existing security devices to automatically block attacks and prevent data theft and corruption.
Download Datasheet »

Case Studies

University of Baltimore
"ThreatSTOP has eliminated manual blacklisting and remediation, and reduced help desk tickets related to malware by 90%, to only 1-2 per month."
    - Mike Connors, Information Security Analyst

Download Case Study »

Bibliotheek Rotterdam
"ThreatSTOP has solved a big headache for us. Now we have no service stoppages, no escalations with the ISP, and no manual cleanups."
    - Nikola Nicolic, Contracts and Services Manager

Download Case Study »

Cirrus Tech
"ThreatSTOP’s IP reputation service provides invaluable protection for Cirrus Tech and our customers against threats that other solutions fail to address."
    - Ehsan Mirdamadi, CEO, Cirrus Tech

Download Case Study »

AISO.net
"ThreatSTOP is the clear leader in IP reputation services, and provides invaluable protection for AISO and our customers against zero-day, APTs, botnets and other advanced threats."
    - Phil Nash, CTO, AISO.net

Download Case Study »

Armor Logo

Armor (formerly FireHost)
"Implementing this system has helped to decrease the number of total attacks against our customers by about 40 percent."
    - Chris Drake, Founder/CTO, FireHost

Download Case Study »

NonLinear Tech
"ThreatSTOP was able to help us rapidly identify and remediate a spam botnet that was putting one of our customer’s business at risk."
    - John Verbrugge, Principal, NonLinear Tech

Download Case Study »

VM Racks
"Our healthcare customers need the security required to comply with HIPAA and protect critical EMR (electronic medical record) data. ThreatSTOP provides us a highly valuable layer of 'outside-in' protection that blocks DDOS, brute force, and other attacks before they hit the firewall."
    - Gil Vidals, CEO

Download Case Study »

Phoenix Energy Systems
"By automating the process and providing the reports, ThreatSTOP provides me a peace of mind and saves me time."
    - Carol Maffitt, CIO

Download Case Study »

Earth Systems
"ThreatSTOP works great. We are attacked every day and it stops them. It gives me the warm and fuzzies that
I am protected. It's well worth every penny."
    - Richard Gaustad, VP & CIO

Download Case Study »

West Memphis School District
"I had no idea my network printers are talking to China!"
    - Gary Woodward, Network Administrator

Download Case Study »

Whitepapers

Healthcare Information Security
Description: Healthcare information has become an increasingly valuable target. This paper reviews the value of this information and the reasons that healthcare infrastructure attacks are on the rise.
Download Whitepaper »
Leading Cybersecurity Out of Medieval Times
Description: Today's security threats may be considered "advanced" by some, but ThreatSTOP founder and CEO Tom Byrnes believes many organizations are living in the medieval times of cybersecurity. How can they avoid slipping into the Dark Ages?
Download Whitepaper »
Threat Mitigation:
Proactive Defense against Botnets and Criminal Malware
Download Whitepaper »

Security Reports

ThreatSTOP Black Energy Security Report
Description: December 2015, two days before Christmas, Ukraine's power industry suffered a cyberattack that left 80,000 customers without power for several hours. Read how the Black Energy has evolved over time.
Download DataSheet »
ThreatSTOP Neutrino Security Report
Description: Exploit kits are used by cyber criminals to take advantage of vulnerabilities on a machine to delivery various types of malware. Recently our security researchers noted an uptick in the number of DGA infrastructure sites for Neutrino EK.
Download DataSheet »

Podcasts

Leading Cybersecurity Out of Medieval Times
Description: Today's security threats may be considered "advanced" by some, but ThreatSTOP founder and CEO Tom Byrnes believes many organizations are living in the medieval times of cybersecurity. How can they avoid slipping into the Dark Ages?
Listen to Podcast »
The Peggy Smedley Show
Description: ThreatSTOP’s Chief Scientist, Paul Mockapetris, recently joined The Peggy Smedley Show for a discussion on the importance of education in cybersecurity and the basic steps people can take to reduce risk.
Listen to Podcast »

Videos

Networks Under Siege - The ThreatSTOP Solution

How it Works

The Benefits of ThreatSTOP

ThreatSTOP Overview Video

How to stop cloud attacks before damage occurs

Know your Ground: The Evolution of the Cyber Battlefield

Securing the Things (including the ones you already have)